The Detection & Response Chronicles: Exploring Telegram Abuse Adversaries utilizing popular messaging apps throughout different attack phases is nothing new. Telegram, in particular, has consta...
#Blue #Team #Cyber #Threats #Detection #stealer #deerstealer […]
[Original post on blog.nviso.eu]
The Detection & Response Chronicles: Exploring Telegram Abuse Adversaries utilizing popular messaging apps throughout different attack phases is nothing new. Telegram, in particular, has consta...
#Cyber #Threats #Blue #Team #deerstealer #xworm #ravenstealer […]
[Original post on blog.nviso.eu]
IUAM ClickFix Generator auto-builds browser-verification phishing pages with clipboard injection and OS detection; observed on 38.242.212.5:3000 and linked to DeerStealer distribution. #phishing #ClickFix #DeerStealer https://bit.ly/3VZOc3e
6/ TAG-150 also deploys other malware families, including #SectopRAT, #WarmCookie, #HijackLoader, and #NetSupportRAT, as well as numerous stealers: #Stealc, #RedLine, #Rhadamanthys, #DeerStealer, #MonsterV2, and more.
~Anyrun~
Campaigns use obfuscated .LNK files and fake installers to deliver stealers like DeerStealer and Snake Keylogger.
-
IOCs: tripplefury. com, reallyfreegeoip. org, 104. 21. 96. 1
-
#DeerStealer #Malware #SnakeKeylogger #ThreatIntel
Beware of new phishing campaigns delivering #DeerStealer malware via weaponized .LNK files exploiting #LOLBin techniques. Stay vigilant and update your security measures. #CyberSecurity #MalwareAlert Link: thedailytechfeed.com/deerstealer-...